DOI QR코드

DOI QR Code

TSCH-Based Scheduling of IEEE 802.15.4e in Coexistence with Interference Network Cluster: A DNN Approach

  • Haque, Md. Niaz Morshedul (Department of Electrical, Electronic and Computer Engineering, University of Ulsan) ;
  • Koo, Insoo (Department of Electrical, Electronic and Computer Engineering, University of Ulsan)
  • Received : 2021.11.11
  • Accepted : 2021.11.18
  • Published : 2022.02.28

Abstract

In the paper, we propose a TSCH-based scheduling scheme for IEEE 802.15.4e, which is able to perform the scheduling of its own network by avoiding collision from interference network cluster (INC). Firstly, we model a bipartite graph structure for presenting the slot-frame (channel-slot assignment) of TSCH. Then, based on the bipartite graph edge weight, we utilize the Hungarian assignment algorithm to implement a scheduling scheme. We have employed two features (maximization and minimization) of the Hungarian-based assignment algorithm, which can perform the assignment in terms of minimizing the throughput of INC and maximizing the throughput of own network. Further, in this work, we called the scheme "dual-stage Hungarian-based assignment algorithm". Furthermore, we also propose deep learning (DL) based deep neural network (DNN)scheme, where the data were generated by the dual-stage Hungarian-based assignment algorithm. The performance of the DNN scheme is evaluated by simulations. The simulation results prove that the proposed DNN scheme providessimilar performance to the dual-stage Hungarian-based assignment algorithm while providing a low execution time.

Keywords

Acknowledgement

This work was supported in part by the National Research Foundation of Korea through the Korean Government Ministry of Science and ICT (MSIT) under Grant NRF-2021R1A2B5B01001721. In addition, these results were supported by "Regional Innovation Strategy (RIS)" through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(MOE)(2021RIS-003)

References

  1. The Cicso Company, "Cisco Visual Networking Index : Global Mobile Data Traffic Forecast Update , 2016 - 2021 white paper," Cisco:San Jose, CA, USA, 2017.
  2. R. Natarajan, P. Zand, and M. Nabi, "Analysis of coexistence between IEEE 802.15.4, BLE and IEEE 802.11 in the 2.4 GHz ISM band," IECON Proc. (Industrial Electron. Conf., pp. 6025-6032, 2016, doi: 10.1109/IECON.2016.7793984.
  3. M. Ojo and S. Giordano, "An efficient centralized scheduling algorithm in IEEE 802.15.4e TSCH networks," 2016 IEEE Conf. Stand. Commun. Networking, CSCN 2016, 2016, doi: 10.1109/CSCN.2016.7785164.
  4. N. Taheri Javan, M. Sabaei, and V. Hakami, "IEEE 802.15.4.e TSCH-Based Scheduling for Throughput Optimization: A Combinatorial Multi-Armed Bandit Approach," IEEE Sens. J., vol. 20, no. 1, pp. 525-537, 2020, doi: 10.1109/JSEN.2019.2941012.
  5. D. De Guglielmo, S. Brienza, and G. Anastasi, "IEEE 802.15.4e: A survey," Comput. Commun., vol. 88, pp. 1-24, 2016, doi: 10.1016/j.comcom.2016.05.004.
  6. S. Kharb and A. Singhrova, "A survey on network formation and scheduling algorithms for time slotted channel hopping in industrial networks," J. Netw. Comput. Appl., vol. 126, no. October 2018, pp. 59-87, 2019, doi: 10.1016/j.jnca.2018.11.004.
  7. L. Alkama and L. Bouallouche-Medjkoune, "IEEE 802.15.4 historical revolution versions: A survey," Computing, vol. 103, no. 1, pp. 99-131, 2021, doi: 10.1007/s00607-020-00844-3.
  8. T. Watteyne, A. Mehta, and K. Pister, "Reliability through frequency diversity: Why channel hopping makes sense," PE-WASUN'09 - Proc. 6th ACM Int. Symp. Perform. Eval. Wirel. Ad-Hoc, Sensor, Ubiquitous Networks, no. September 2014, pp. 116-123, 2009, doi: 10.1145/1641876.1641898.
  9. S. Hammoudi, S. Harous, and Z. Aliouat, "External Interference Free Channel Access Strategy Dedicated to TSCH," IEEE Int. Conf. Electro Inf. Technol., vol. 2018-May, pp. 350-355, 2018, doi: 10.1109/EIT.2018.8500259.
  10. L. P. Sachs, "Performance evaluation.," NLN Publ., vol. 20, no. 17-1807, pp. 61-64, 1980.
  11. D. D. G. authorGiuseppe A. A. Seghetti, "From IEEE 802.15.4 to IEEE 802.15.4e: A Step Towards the Internet of Things," Adv. onto Internet Things, pp. 135-152, 2014.
  12. J. Ansari and P. Mahonen, "Channel selection in spectrum agile and cognitive MAC protocols for wireless sensor networks," MobiWac'10 - Proc. 8th ACM Int. Symp. Mobil. Manag. Wirel. Access, Co-located with MSWiM'10, pp. 83-90, 2010, doi: 10.1145/1868497.1868511.
  13. R. Mennes, M. Claeys, F. A. P. De Figueiredo, I. Jabandzic, I. Moerman, and S. Latre, "Deep Learning-Based Spectrum Prediction Collision Avoidance for Hybrid Wireless Environments," IEEE Access, vol. 7, pp. 45818-45830, 2019, doi: 10.1109/ACCESS.2019.2909398.
  14. R. Mennes, F. A. P. De Figueiredo, and S. Latre, "Multi-Agent Deep Learning for Multi-Channel Access in Slotted Wireless Networks," IEEE Access, vol. 8, no. ii, pp. 95032-95045, 2020, doi: 10.1109/ACCESS.2020.2995456.
  15. L. Liang, H. Ye, G. Yu, and G. Y. Li, "Deep-Learning-Based Wireless Resource Allocation with Application to Vehicular Networks," Proc. IEEE, vol. 108, no. 2, pp. 341-356, 2020, doi: 10.1109/JPROC.2019.2957798.
  16. I. Hameed, P. V. Tuan, and I. Koo, "Exploiting a deep neural network for efficient transmit power minimization in a wireless powered communication network," Appl. Sci., vol. 10, no. 13, 2020, doi: 10.3390/app10134622.
  17. I. Hameed and P. V. and I. K. Tuan, "Deep Learning - Based Energy Beamforming With Transmit Power Control in Wireless Powered Communication Networks," IEEE Access, pp. 142795-142803, 2021. https://doi.org/10.1109/access.2020.3013733
  18. Q. Tong, X. Zou, and H. Tong, "A RFID authentication protocol based on infinite dimension pseudo random number generator," Proc. 2009 Int. Jt. Conf. Comput. Sci. Optim. CSO 2009, vol. 1, pp. 292-294, 2009, doi: 10.1109/CSO.2009.436.
  19. J. Ma et al., "Social account linking via weighted bipartite graph matching," Int. J. Commun. Syst., vol. 31, no. 7, pp. 1-14, 2018, doi: 10.1002/dac.3471.